关注
Rossouw Von Solms
Rossouw Von Solms
Nelson Mandela University
在 nmmu.ac.za 的电子邮件经过验证
标题
引用次数
年份
'N Bestuurshulpmiddel vir die evaluering van'n maatskappy se rekenaarsekerheidsgraad
R Von Solms
PQDT-Global, 1989
1989
A business approach to effective information technology risk analysis and management
S Halliday, K Badenhorst, R Von Solms
Information management & computer security 4 (1), 19-31, 1996
1511996
A conceptual framework for cyber-security awareness and education in SA
N Kortjan, R Von Solms
South African Computer Journal 52 (1), 29-41, 2014
1162014
A cybersecurity curriculum
M De Lange, R Von Solms
Southern African Cyber Security Awareness Workshop 2011, 2011
12011
A cyclic approach to business continuity planning
J Botha, R Von Solms
Information Management & Computer Security 12 (4), 328-337, 2004
1822004
A Feasibility Study Towards E-processing Supply Chain Management Transactions in South African Municipalities
S Koekemoer, R Von Solms
Proceedings of Sixth International Congress on Information and Communication …, 2022
2022
A formalized approach to the effective selection and evaluation of information security controls
L Barnard, R Von Solms
Computers & Security 19 (2), 185-194, 2000
982000
A framework for assuring the conformance of cloud-based email
M Willett, R Von Solms
8th International Conference for Internet Technology and Secured …, 2013
22013
A framework for information security evaluation
R von Solms, H Van Der Haar, SH von Solms, WJ Caelli
Information & Management 26 (3), 143-153, 1994
891994
A framework for the governance of information security
S Posthumus, R Von Solms
Computers & security 23 (8), 638-646, 2004
4142004
A framework towards governing “Bring Your Own Device in SMMEs”
N Fani, R von Solms, M Gerber
2016 Information Security for South Africa (ISSA), 1-8, 2016
172016
A general morphological analysis: delineating a cyber-security culture
N Gcaza, R Von Solms, MM Grobler, JJ Van Vuuren
Information & Computer Security 25 (3), 259-278, 2017
422017
A holistic framework for the fostering of an information security sub-culture in organizations.
J Van Niekerk, R Von Solms
Issa 1 (13), 2005
942005
A Methodology for Establishing an Information Security Governance Environment
SH Solms, R Solms, SH von Solms, R von Solms
Information Security Governance, 1-4, 2009
2009
A model for deriving information security control attribute profiles
H Van der Haar, R Von Solms
Computers & Security 22 (3), 233-244, 2003
332003
A model for information security governance in developing countries
J Coertze, R von Solms
e-Infrastructure and e-Services for Developing Countries: 4th International …, 2013
262013
A model for information security management
R Von Solms, SH Von Solms, WJ Caelli
Information Management & Computer Security 1 (3), 12-17, 1993
111993
A practical approach to information security awareness in the organization
C Vroom, R von Solms
Security in the Information Society: Visions and Perspectives, 19-37, 2002
292002
A responsibility framework for information security
S Posthumus, R von Solms
Security Management, Integrity, and Internal Control in Information Systems …, 2005
242005
A Risk-Based Approach to Formalise Information Security Requirements for Software Development
L Futcher, R Von Solms
Information Assurance and Security Education and Training: 8th IFIP WG 11.8 …, 2013
32013
系统目前无法执行此操作,请稍后再试。
文章 1–20